多选题 A network engineer is designing the architecture for a healthcare company's workload that is moving to the AWS Cloud. All data to and from the
On-premises environment must be encrypted in transit. All tra¨c also must be inspected in the cloud before the tra¨c is allowed to leave the
Cloud and travel to the on-premises environment or to the internet.
The company will expose components of the workload to the internet so that patients can reserve appointments. The architecture must secure
These components and protect them against DDoS attacks. The architecture also must provide protection against ¦nancial liability for services
That scale out during a DDoS event.
Which combination of steps should the network engineer take to meet all these requirements for the workload? (Choose three.)
A、 Use Tra¨c Mirroring to copy all tra¨c to a §eet of tra¨c capture appliances.
B、 Set up AWS WAF on all network components.
C、 Con¦gure an AWS Lambda function to create Deny rules in security groups to block malicious IP addresses.
D、 Use AWS Direct Connect with MACsec support for connectivity to the cloud.
E、 Use Gateway Load Balancers to insert third-party ¦rewalls for inline tra¨c inspection.
F、 Con¦gure AWS Shield Advanced and ensure that it is con¦gured on all public assets.
单选题 A company is deploying a new application in the AWS Cloud. The company wants a highly available web server that will sit behind an Elastic Load
Balancer. The load balancer will route requests to multiple target groups based on the URL in the request. All tra¨c must use HTTPS. TLS
Processing must be o©oaded to the load balancer. The web server must know the user’s IP address so that the company can keep accurate logs
For security purposes.
Which solution will meet these requirements?
A、 Deploy an Application Load Balancer with an HTTPS listener. Use path-based routing rules to forward the tra¨c to the correct target group.
Include the X-Forwarded-For request header with tra¨c to the targets.
B、 Deploy an Application Load Balancer with an HTTPS listener for each domain. Use host-based routing rules to forward the tra¨c to the
Correct target group for each domain. Include the X-Forwarded-For request header with tra¨c to the targets.
C、 Deploy a Network Load Balancer with a TLS listener. Use path-based routing rules to forward the tra¨c to the correct target group.
Con¦gure client IP address preservation for tra¨c to the targets.
D、 Deploy a Network Load Balancer with a TLS listener for each domain. Use host-based routing rules to forward the tra¨c to the correct
Target group for each domain. Con¦gure client IP address preservation for tra¨c to the targets.
单选题 A global delivery company is modernizing its §eet management system. The company has several business units. Each business unit designs and
Maintains applications that are hosted in its own AWS account in separate application VPCs in the same AWS Region. Each business unit's
Applications are designed to get data from a central shared services VPC.
The company wants the network connectivity architecture to provide granular security controls. The architecture also must be able to scale as
More business units consume data from the central shared services VPC in the future.
Which solution will meet these requirements in the MOST secure manner?
A、 Create a central transit gateway. Create a VPC attachment to each application VPC. Provide full mesh connectivity between all the VPCs by
Using the transit gateway.
B、 Create VPC peering connections between the central shared services VPC and each application VPC in each business unit's AWS account.
C、 Create VPC endpoint services powered by AWS PrivateLink in the central shared services VPCreate VPC endpoints in each application VPC.
D、 Create a central transit VPC with a VPN appliance from AWS Marketplace. Create a VPN attachment from each VPC to the transit VPC.
Provide full mesh connectivity among all the VPCs.
单选题 A company uses a 4 Gbps AWS Direct Connect dedicated connection with a link aggregation group (LAG) bundle to connect to ¦ve VPCs that are
Deployed in the us-east-1 Region. Each VPC serves a different business unit and uses its own private VIF for connectivity to the on-premises
Environment. Users are reporting slowness when they access resources that are hosted on AWS.
A network engineer ¦nds that there are sudden increases in throughput and that the Direct Connect connection becomes saturated at the same
Time for about an hour each business day. The company wants to know which business unit is causing the sudden increase in throughput. The
Network engineer must ¦nd out this information and implement a solution to resolve the problem.
Which solution will meet these requirements?
A、 Review the Amazon CloudWatch metrics for VirtualInterfaceBpsEgress and VirtualInterfaceBpsIngress to determine which VIF is sending
The highest throughput during the period in which slowness is observed. Create a new 10 Gbps dedicated connection. Shift tra¨c from the
Existing dedicated connection to the new dedicated connection.
B、 Review the Amazon CloudWatch metrics for VirtualInterfaceBpsEgress and VirtualInterfaceBpsIngress to determine which VIF is sending
The highest throughput during the period in which slowness is observed. Upgrade the bandwidth of the existing dedicated connection to 10
Gbps.
C、 Review the Amazon CloudWatch metrics for ConnectionBpsIngress and ConnectionPpsEgress to determine which VIF is sending the
Highest throughput during the period in which slowness is observed. Upgrade the existing dedicated connection to a 5 Gbps hosted
Connection.
D、 Review the Amazon CloudWatch metrics for ConnectionBpsIngress and ConnectionPpsEgress to determine which VIF is sending the
Highest throughput during the period in which slowness is observed. Create a new 10 Gbps dedicated connection. Shift tra¨c from the
Existing dedicated connection to the new dedicated connection.
多选题 A retail company is running its service on AWS. The company’s architecture includes Application Load Balancers (ALBs) in public subnets. The
ALB target groups are con¦gured to send tra¨c to backend Amazon EC2 instances in private subnets. These backend EC2 instances can call
Externally hosted services over the internet by using a NAT gateway.
The company has noticed in its billing that NAT gateway usage has increased signi¦cantly. A network engineer needs to ¦nd out the source of this
Increased usage.
Which options can the network engineer use to investigate the tra¨c through the NAT gateway? (Choose two.)
A、 Enable VPC §ow logs on the NAT gateway's elastic network interface. Publish the logs to a log group in Amazon CloudWatch Logs. Use
CloudWatch Logs Insights to query and analyze the logs.
B、 Enable NAT gateway access logs. Publish the logs to a log group in Amazon CloudWatch Logs. Use CloudWatch Logs Insights to query and
Analyze the logs.
C、 Con¦gure Tra¨c Mirroring on the NAT gateway's elastic network interface. Send the tra¨c to an additional EC2 instance. Use tools such as
Tcpdump and Wireshark to query and analyze the mirrored tra¨c.
D、 Enable VPC §ow logs on the NAT gateway's elastic network interface. Publish the logs to an Amazon S3 bucket. Create a custom table for
The S3 bucket in Amazon Athena to describe the log structure. Use Athena to query and analyze the logs.
E、 Enable NAT gateway access logs. Publish the logs to an Amazon S3 bucket. Create a custom table for the S3 bucket in Amazon Athena to
Describe the log structure. Use Athena to query and analyze the logs.
多选题 A software-as-a-service (SaaS) provider hosts its solution on Amazon EC2 instances within a VPC in the AWS Cloud. All of the provider's
Customers also have their environments in the AWS Cloud.
A recent design meeting revealed that the customers have IP address overlap with the provider's AWS deployment. The customers have stated
That they will not share their internal IP addresses and that they do not want to connect to the provider's SaaS service over the internet.
Which combination of steps is part of a solution that meets these requirements? (Choose two.)
A、 Deploy the SaaS service endpoint behind a Network Load Balancer.
B、 Con¦gure an endpoint service, and grant the customers permission to create a connection to the endpoint service.
C、 Deploy the SaaS service endpoint behind an Application Load Balancer.
D、 Con¦gure a VPC peering connection to the customer VPCs. Route tra¨c through NAT gateways.
E、 Deploy an AWS Transit Gateway, and connect the SaaS VPC to it. Share the transit gateway with the customers. Con¦gure routing on the
Transit gateway.
单选题 A company has developed an application on AWS that will track inventory levels of vending machines and initiate the restocking process
Automatically. The company plans to integrate this application with vending machines and deploy the vending machines in several markets around
The world. The application resides in a VPC in the us-east-1 Region. The application consists of an Amazon Elastic Container Service (Amazon
ECS) cluster behind an Application Load Balancer (ALB). The communication from the vending machines to the application happens over HTTPS.
The company is planning to use an AWS Global Accelerator accelerator and con¦gure static IP addresses of the accelerator in the vending
Machines for application endpoint access. The application must be accessible only through the accelerator and not through a direct connection
Over the internet to the ALB endpoint.
Which solution will meet these requirements?
A、 Con¦gure the ALB in a private subnet of the VPC. Attach an internet gateway without adding routes in the subnet route tables to point to the
Internet gateway. Con¦gure the accelerator with endpoint groups that include the ALB endpoint. Con¦gure the ALB’s security group to only
Allow inbound tra¨c from the internet on the ALB listener port.
B、 Con¦gure the ALB in a private subnet of the VPC. Con¦gure the accelerator with endpoint groups that include the ALB endpoint. Con¦gure
The ALB's security group to only allow inbound tra¨c from the internet on the ALB listener port.
C、 Con¦gure the ALB in a public subnet of the VPAttach an internet gateway. Add routes in the subnet route tables to point to the internet
Gateway. Con¦gure the accelerator with endpoint groups that include the ALB endpoint. Con¦gure the ALB's security group to only allow
Inbound tra¨c from the accelerator's IP addresses on the ALB listener port.
D、 Con¦gure the ALB in a private subnet of the VPC. Attach an internet gateway. Add routes in the subnet route tables to point to the internet
Gateway. Con¦gure the accelerator with endpoint groups that include the ALB endpoint. Con¦gure the ALB's security group to only allow
Inbound tra¨c from the accelerator's IP addresses on the ALB listener port.
单选题 A company is planning to create a service that requires encryption in transit. The tra¨c must not be decrypted between the client and the backend
Of the service. The company will implement the service by using the gRPC protocol over TCP port 443. The service will scale up to thousands of
Simultaneous connections. The backend of the service will be hosted on an Amazon Elastic Kubernetes Service (Amazon EKS) duster with the
Kubernetes Cluster Autoscaler and the Horizontal Pod Autoscaler con¦gured. The company needs to use mutual TLS for two-way authentication
Between the client and the backend.
Which solution will meet these requirements?
A、 Install the AWS Load Balancer Controller for Kubernetes. Using that controller, con¦gure a Network Load Balancer with a TCP listener on
Port 443 to forward tra¨c to the IP addresses of the backend service Pods.
B、 Install the AWS Load Balancer Controller for Kubernetes. Using that controller, con¦gure an Application Load Balancer with an HTTPS
Listener on port 443 to forward tra¨c to the IP addresses of the backend service Pods.
C、 Create a target group. Add the EKS managed node group's Auto Scaling group as a target Create an Application Load Balancer with an
HTTPS listener on port 443 to forward tra¨c to the target group.
D、 Create a target group. Add the EKS managed node group’s Auto Scaling group as a target. Create a Network Load Balancer with a TLS
Listener on port 443 to forward tra¨c to the target group.